-
1
-
-
0025386404
-
A logic of authentication
-
BAN90
-
[BAN90] Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems 8(1), 18-36 (1990)
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
2
-
-
84937391830
-
-
[Bel01] Bella, G.: Mechanising a Protocol for Smart Cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, 2140, p. 19. Springer, Heidelberg (2001)
-
[Bel01] Bella, G.: Mechanising a Protocol for Smart Cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol. 2140, p. 19. Springer, Heidelberg (2001)
-
-
-
-
3
-
-
68249091950
-
Automatic Verification of Correspondences for Security Protocols
-
Bla09
-
[Bla09] Blanchet, B.: Automatic Verification of Correspondences for Security Protocols. Journal of Computer Security 17(4), 363-434 (2009)
-
(2009)
Journal of Computer Security
, vol.17
, Issue.4
, pp. 363-434
-
-
Blanchet, B.1
-
4
-
-
33750247207
-
Verifying the SET purchase protocols
-
BMP06
-
[BMP06] Bella, G., Massacci, F., Paulson, L.C.: Verifying the SET purchase protocols. Journal of Automated Reasoning 36(1-2), 5-37 (2006)
-
(2006)
Journal of Automated Reasoning
, vol.36
, Issue.1-2
, pp. 5-37
-
-
Bella, G.1
Massacci, F.2
Paulson, L.C.3
-
5
-
-
19744367735
-
OFMC: A symbolic model checker for security protocols
-
BMV05
-
[BMV05] Basin, D.A., Mödersheim, S., Viganò, L.: OFMC: A symbolic model checker for security protocols. Int. J. Inf. Sec. 4(3), 181-208 (2005)
-
(2005)
Int. J. Inf. Sec
, vol.4
, Issue.3
, pp. 181-208
-
-
Basin, D.A.1
Mödersheim, S.2
Viganò, L.3
-
6
-
-
55049132505
-
-
+00] Balser, M., Reif, W., Schellhorn, G., Stenzel, K., Thums, A.: Formal system development with KIV. In: Maibaum, T. (ed.) FASE 2000. LNCS, 1783, p. 363. Springer, Heidelberg (2000)
-
+00] Balser, M., Reif, W., Schellhorn, G., Stenzel, K., Thums, A.: Formal system development with KIV. In: Maibaum, T. (ed.) FASE 2000. LNCS, vol. 1783, p. 363. Springer, Heidelberg (2000)
-
-
-
-
9
-
-
37549064606
-
-
[HGRS07] Haneberg, D., Grandy, H., Reif, W., Schellhorn, G.: Verifying Smart Card Applications: An ASM Approach. In: Davies, J., Gibbons, J. (eds.) IFM 2007. LNCS, 4591, pp. 313-332. Springer, Heidelberg (2007)
-
[HGRS07] Haneberg, D., Grandy, H., Reif, W., Schellhorn, G.: Verifying Smart Card Applications: An ASM Approach. In: Davies, J., Gibbons, J. (eds.) IFM 2007. LNCS, vol. 4591, pp. 313-332. Springer, Heidelberg (2007)
-
-
-
-
12
-
-
37849037975
-
-
JW08] Jones, C, Woodcock, J, eds, Springer, Heidelberg
-
[JW08] Jones, C., Woodcock, J. (eds.): Formal Aspects of Computing, vol. 20 (1). Springer, Heidelberg (2008)
-
(2008)
Formal Aspects of Computing
, vol.20
, Issue.1
-
-
-
13
-
-
0342658605
-
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
-
Low96, Margaria, T, Steffen, B, eds, TACAS 1996, Springer, Heidelberg
-
[Low96] Lowe, G.: Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147-166. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
14
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
Mea96
-
[Mea96] Meadows, C.: The NRL protocol analyzer: An overview. Journal of Logic Programming 26(2), 113-131 (1996)
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
15
-
-
70349673753
-
-
[MSGR09] Moebius, N., Stenzel, K., Grandy, H., Reif, W.: SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications. In: Third International Workshop on Secure Software Engineering, SecSE, at ARES 2009. IEEE Press, Los Alamitos (2009)
-
[MSGR09] Moebius, N., Stenzel, K., Grandy, H., Reif, W.: SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications. In: Third International Workshop on Secure Software Engineering, SecSE, at ARES 2009. IEEE Press, Los Alamitos (2009)
-
-
-
-
16
-
-
77949445049
-
Modeling Security-Critical Applications with UML in the SecureMDD Approach
-
MSR08
-
[MSR08] Moebius, N., Stenzel, K., Reif, W.: Modeling Security-Critical Applications with UML in the SecureMDD Approach. International Journal on Advances in Software 1(1) (2008)
-
(2008)
International Journal on Advances in Software
, vol.1
, Issue.1
-
-
Moebius, N.1
Stenzel, K.2
Reif, W.3
-
18
-
-
0031643297
-
The Inductive Approach to Verifying Cryptographic Protocols
-
Pau98
-
[Pau98] Paulson, L.C.: The Inductive Approach to Verifying Cryptographic Protocols. J. Computer Security 6 (1998)
-
(1998)
J. Computer Security
, vol.6
-
-
Paulson, L.C.1
-
19
-
-
77952332440
-
Formal support to security protocol development: A survey
-
PM08
-
[PM08] Lopez Pimental, J.C., Monroy, R.: Formal support to security protocol development: A survey. Computacion y Sistemas 12(1) (2008)
-
(2008)
Computacion y Sistemas
, vol.12
, Issue.1
-
-
Lopez Pimental, J.C.1
Monroy, R.2
-
20
-
-
33750115438
-
First Steps in the Verified Software Grand Challenge
-
Woo06
-
[Woo06] Woodcock, J.: First Steps in the Verified Software Grand Challenge. IEEE Computer 39(10), 57-64 (2006)
-
(2006)
IEEE Computer
, vol.39
, Issue.10
, pp. 57-64
-
-
Woodcock, J.1
|